101
submitted 2 days ago by otter@lemmy.ca to c/selfhosted@lemmy.world

As Synology explains in security advisories published two days after the flaws were demoed at Pwn2Own Ireland 2024 to hijack a Synology BeeStation BST150-4T device, the security flaws enable remote attackers to gain remote code execution as root on vulnerable NAS appliances exposed online.

"The vulnerability was initially discovered, within just a few hours, as a replacement for another Pwn2Own submission. The issue was disclosed to Synology immediately after demonstration, and within 48 hours a patch was made available which resolves the vulnerability," Midnight Blue said.

From a different source:

Synology proactively sponsors and works with security researchers as part of product security initiatives. At this year's Pwn2Own Ireland 2024 event, which took place in late October, we successfully discovered and resolved multiple security vulnerabilities.

While these vulnerabilities are not being exploited, we recommend all Synology device administrators immediately take action to secure their systems by updating due to the scope and severity of specific issues.

you are viewing a single comment's thread
view the rest of the comments
[-] nameisnotimportant@lemmy.ml 0 points 2 days ago

Don’t make it available from internet. This will solve the issue.

Thanks, I've read this countless times but that's basically half of the use I make from my NAS so no.

I'll try to secure it and still use it from outside / Internet then.

[-] DarkDarkHouse@lemmy.sdf.org 1 points 17 hours ago

Tailscale is available as an official DSM package, so if it’s only you accessing it you could still block it from the Internet.

[-] possiblylinux127@lemmy.zip 4 points 1 day ago

You will get compromised if you haven't already. (Your device becomes part of a botnet)

If you don't want new hardware use something actively supported like TrueNAS or regular Linux. You are asking for trouble. No hardening will protect you from out of date software with serious security holes.

[-] nameisnotimportant@lemmy.ml 1 points 1 day ago

(Your device becomes part of a botnet)

Out of curiosity, how can I know if it's already the case?

No hardening will protect you from out of date software with serious security holes

Connecting to the NAS only via VPN won't be enough?

[-] thelittleblackbird@lemmy.world 3 points 1 day ago

Yes, it will be enough if your services are not exposed via port forwarding , tailscale / zerotier are super convenient for this.

Honestly, if I were you I would start thinking in having a small computer just to act like a proxy / firewall of you synology, or even better, just run the applications on that computer and let the nas only serve files and data.

It is much easier to support, maintain and hardening a debain with a minimal intallation than nay synology box just because the amount of resources available to do so. In this easy way you could extent the life of your nas far beyond the end of life of the Sw

this post was submitted on 13 Nov 2024
101 points (99.0% liked)

Selfhosted

40173 readers
716 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS